Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

April 25 2017

Reposted fromgruetze gruetze viagingerglue gingerglue
3633 a4fc
Reposted fromStoneColdSober StoneColdSober
5585 39f9 500
Reposted frommahiaslsan mahiaslsan viadychterFyrst dychterFyrst
Play fullscreen


Eine Schulklasse in Bad Zurzach (Schweiz) hat ihren Deutschunterricht etwas aufgelockert.
Die Schüler haben gemeinsam mit ihrer Lehrerin die Ortschaft barbaraisiert.
Dabei sind klasse Werke entstanden, die am Schluß des Videos gezeigt werden. (geht nur 2 Minuten)
Zwei Erkenntnisse ziehe ich daraus:
1. Ich hätte auch gerne eine Deutschlehrerin gehabt, die solche ungewöhnlichen Projekte anstößt.
2. Ich muss mich warm anziehen, der Streetart-Nachwuchs kommt mit ganz großen Schritten und hat frische Ideen im Gepäck. Das gefällt mir sehr!
Vielen Dank für die wunderbare Hommage an alle beteiligten Schüler und natürlich auch an die Lehrerin.
Ich fühle mich sehr geehrt und war ganz überwältigt, als mir das Video gestern völlig überraschend zugespielt wurde.
Liebe Grüße und so in die Schweiz,
eure Barbara.

Reposted fromswissfondue swissfondue viadychterFyrst dychterFyrst

What is Hacking?


A complicated question such as this seems like a good place to start. Hacking is the breakdown of technology and software by means of Analyzing, Understanding, and Manipulating said technology and using it to meet the users needs. Exploiting technology has been the purpose of hackers since the inception of the term in the 1960s. This is the overly simplified definition of a hacker though as there are many types of hackers and to each there is their own definition of what a hacker is. In today’s media “Hackers” is used as an umbrella term for all individuals who exploit technology for malicious purposes or for whistle-blowers and has received negative connotations, being equated (by the media) to terrorism.

>What are the types of Hackers?

  • White Hat: These are hacker that use their skills for non-Malicious purposes many taking jobs in the security field to work for large companies to secure their networks. Some also take positions in education to teach the future generations about technology. These are the “ethical” hackers.
  • Black Hat: This is the section of hackers that use their skills for malicious purposes. They typically take root in black markets for freelance selling and trading of personal information, or cracking systems for more personal reasons such as the challenge or a claim to fame.
  • Grey Hat: This is the morally ambiguous hacker sect. Those who really just do what they like based on their own moral code. These are the publishers and whistle-blowers.
  • Blue Hat: This is a less known section of hackers. I prefer calling them Bug Catchers because that is essentially what they are: Debuggers and coders that edit, correct, and update code for major companies. The micro-managers of the hacking world.

>What is Penetration Testing?
Penetration testing is the act of simulating a real world attack to demonstrate exploits and vulnerabilities in a system. This is typically done by a paid professional under contract from the company being tested, with a set goal in mind laid out in the contract.
The methodology and sequencing used in most Penetration Testing is…

  • Find a feature needing testing
  • Find a vulnerability in the feature
  • Design an attack around the vulnerability
  • Test the designed attack for effectiveness
  • Enter Attack
  • Exploit the entry
  • After the sequencing, record your findings and what can be done in the future to prevents these flaws.

>How to work as a Penetration Specialist?
Typically a Degree in Computer Science is necessary for most careers ranging from a BA to an MA; Though, in my opinion, an Associates with several Certifications can do just as well though it is often frowned upon and seen as a easy out from schooling and post-grad studies.
The Certificates, however, are useful alongside any degree level. Certifications are granted by several organizations who work in the field of software and develop/train Hackers in the field. Some of these certifications and organizations are as follows.

  • Offensive Security Certified Professional (OSCP)- Offensive Security; The OSCP does not require re-certification.
  • Certified Ethical Hacker 312-50 (CEH)- EC-Coucil; CEH Re-certification every 3 years
  • Certified Information Systems Security Professions (CISSP)- DoD/NSA; CISSP Re-Certification every 3 years.
  • Certified Information Systems Auditor (CISA)- Information Systems Audit and Control Association; CISA does not require re-certification but its additional certifacatons need renewal every 3 years.
Reposted frombwana bwana viae-gruppe e-gruppe
Reposted fromFlau Flau

Martin Hellman: Congress Should Determine Facts About Chem Attack in Syria

One of Congress's responsibilities is to check and balance executive power. Stanford professor Martin Hellman argues in a recent article that it should act on that responsibility by examining the intelligence Trump used to justify bombing Syria.
Reposted fromin-god-we-trust in-god-we-trust
Reposted fromgruetze gruetze
7833 3d07 500
Reposted fromqb qb viapati2k6 pati2k6

Long before WikiLeaks, the FBI spent decades obsessing over Gavin MacFadyen

40 years before he became a WikiLeaks Director and a Courage Foundation trustee, the Bureau was rifling through MacFadyen’s things

In response to the initial FOIA request for files on deceased WikiLeaks Director and Courage Foundation trustee Gavin MacFadyen, the FBI cited a litany of exemptions


Reposted byin-god-we-trust in-god-we-trust
7554 5d86
Reposted fromqb qb viadychterFyrst dychterFyrst

der iguan ist 70 geworden und das ist doch eine schöne gelegenheit, einen, der bisher alles überlebt hat, mit einem kleinen hörspiel zu feiern.

April 23 2017


Edmund Friedrich Kanoldt (1845-1904), Penelope on the seashore
Reposted byAnna-HexeciarkaLuukkaorchilamikimotokrolperelyoungandstupid

Ist die Mafia jetzt der Gewinner?

Eine Journalistin (Petra Reski) nennt in einem Artikel über die Mafia den Namen eines italienischen Geschäftsmanns. Die Redaktion („Der Freitag“) lässt den Namen in der Geschichte und druckt den Artikel. Der Geschäftsmann klagt. Der Verleger des Blattes (Jakob Augstein) sagt unter anderem, die Journalistin habe ihm und seinem Team den Text „untergejubelt“. Andreas Rossmann schreibt zu all dem: „Zuerst ließ der Verleger Jakob Augstein die Autorin Petra Reski in einem Rechtsstreit hängen. Nun tritt er sogar nach. Ein solches Beispiel darf im Journalismus nicht Schule machen.“




Curse of the Nosferatu on its way to London.

View this on ArtStation
Reposted byoversensitivebansheschaafKryptonitenothingiseverythingorangeugartewhovilleazazelshowmetherainbowshitsuri
Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!